The fact that Albert Einstein never really said, “The definition of insanity is doing the same thing over and over again and expecting a different result,” doesn’t mean it isn’t genius. Think about it. People do this all the time. They keep repeating their mistakes and are surprised when they get the same results.
Never has this been truer than when attributed to cybersecurity today. Enterprises continue to employ a detect and respond approach to stopping web- and email- based attacks. Yet, the security team and senior management continue to shrug their shoulders when the latest major data breach is announced.It’s time to adopt a new approach to cybersecurity defense. No more disparate point solutions. No more alert fatigue. No more cat-and-mouse games. IT organizations need a true solution to the security challenge posed by a new world order.
The cloud is a great place to start. Enterprises are falling over themselves to implement a new digital transformation strategy and move mission-critical applications to the cloud or Software-as-a-Service platforms. The performance, scale and economics of the cloud make digital transformation an easy decision as users require ubiquitous access to the tools and information they need to compete in today’s always-on, 24x7 world.
The problem is that cybersecurity continues to be run with legacy solutions on premise. Firewalls, a secure internet gateway and antivirus/antimalware solutions monitor traffic flowing in and out of the corporate network while users are increasingly accessing corporate data from public networks in a coffee shop, a customer site, poolside or from on the road. This detect and respond approach simply doesn’t apply to the way people work today. Which brings us back to the insanity quote that is so falsely attributed to one of the greatest minds in human history.
Instead of doing the same thing again and again, enterprises need to move to a cloud-based cybersecurity solution to better protect users from increasingly-sophisticated web- and email- based threats--especially as mission-critical applications move away from the data center to the cloud.
But not all cybersecurity solutions in the cloud are created equal. An internet isolation cloud loads and runs all browser-based traffic (Including Email links and attachments) on an isolated web browser in the cloud where malicious activity can be contained. A secure channel separates the isolated browser from the endpoint while only safe, malware-free information is mirrored to the endpoint. A highly restrictive protocol carries rendering updates to the endpoint and returns user input to the isolated browser. Thus, all threats are isolated in an air-gapped browsing environment in the cloud.
Here are five requirements to look for when evaluating an internet isolation cloud solution for your organization:
1. Clientless Deployment: The last thing IT organizations need is another piece of software to install on each and every desktop, laptop, smartphone, and tablet. When consumed as a cloud-based service, company-wide deployment of Internet isolation is as easy and streamlined as possible.
2. Native User Experience: To avoid becoming a roadblock in the user’s workflow, an effective Internet isolation solution delivers a native user experience. In other words, users don’t notice any difference between browsing the web locally on their device and browsing the web via Internet isolation technology.
3. Scalability: As IT organizations undergo their cloud transformation, the number of web requests will only increase. Scaling to meet this demand needs to be effortless.
4. Integration: Isolation technology should be delivered via an internet isolation cloud that provides a variety of other features and capabilities, including access control and data, web and email security.
5. Lower Cost: An internet isolation cloud can reduce operational costs through better malware containment, fewer false positives, lower help desk costs, and a decrease in the need to reimage machines.Moving to an internet isolation cloud that includes these characteristics will allow enterprises to finally meet the security demands of today’s always-on-the-go user. Wherever they log in, they’ll be protected from even the most sophisticated threats while saving the security team time, budget and complexity.